| 3 | 
| 360 video | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | 
| a | 
| active database system | Event and Query Processing in a Fuzzy Active Graph Database System | 
| AI | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | 
| Apps | Mobile Devices Vulnerabilities | 
| AR | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm | 
| Artificial Intelligence | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey | 
| Artificial Neural Network | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning | 
| Augmented Reality | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm | 
| Augmented Reality Requirements | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm | 
| b | 
| B+ tree | Dynamic Meta-Information Management for IoT-based Applications | 
| Black Hat | Ethical Hacking: Skills to Fight Cybersecurity Threats | 
| Blockchain | DSRBT - Driving Safety Reward based on Blockchain Technology | 
| c | 
| CDSS | Dynamic Meta-Information Management for IoT-based Applications | 
| Chronological Survey | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey | 
| Coverage area | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | 
| cryptomining | Mobile Devices Vulnerabilities | 
| d | 
| Driver Safety | DSRBT - Driving Safety Reward based on Blockchain Technology | 
| e | 
| Emotion Detection | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning | 
| Emotional frequencies | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning | 
| End-User Development | An Ontology Based Approach towards End User Development of IoT | 
| Entropy Analysis | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | 
| Ethical Hacking | Ethical Hacking: Skills to Fight Cybersecurity Threats | 
| eye tracking | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | 
| f | 
| Fourier transform | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning | 
| Fuzzy Logic | Event and Query Processing in a Fuzzy Active Graph Database System | 
| g | 
| geolocation | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | 
| Graph Database System | Event and Query Processing in a Fuzzy Active Graph Database System | 
| Grey Hat | Ethical Hacking: Skills to Fight Cybersecurity Threats | 
| h | 
| Hearthstone Battleground Simulator | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | 
| HMD | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | 
| i | 
| Industrial Control System Security | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | 
| Internet of Things | An Ontology Based Approach towards End User Development of IoT | 
| IoT | Dynamic Meta-Information Management for IoT-based Applications Ethical Hacking: Skills to Fight Cybersecurity Threats | 
| iRobot | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | 
| j | 
| JSON Schema | Dynamic Meta-Information Management for IoT-based Applications | 
| k | 
| Keyloggers | Mobile Devices Vulnerabilities | 
| KPIO | Performance Study of Software-based Encrypting Data at Rest | 
| l | 
| lattice | Cost Effective Service Oriented Model for Recruitment | 
| Location-based Study | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | 
| m | 
| machine learning | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning | 
| Madware | Mobile Devices Vulnerabilities | 
| Malware | Mobile Devices Vulnerabilities | 
| medical simulation | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | 
| MIPS | Dynamic Meta-Information Management for IoT-based Applications | 
| Modbus over TCP/IP | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | 
| Monte Carlo Tree Search | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | 
| n | 
| neural network | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey | 
| NVMe | Performance Study of Software-based Encrypting Data at Rest | 
| o | 
| Ontology | An Ontology Based Approach towards End User Development of IoT | 
| p | 
| performance evaluation | Performance Study of Software-based Encrypting Data at Rest | 
| porting | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm | 
| Process Store (PS) | Dynamic Meta-Information Management for IoT-based Applications | 
| r | 
| Random Forest | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning | 
| Recruitment | Cost Effective Service Oriented Model for Recruitment | 
| Redundant Area | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | 
| Rewarding driving | DSRBT - Driving Safety Reward based on Blockchain Technology | 
| Robot Vacuum | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | 
| s | 
| searching algorithm | Dynamic Meta-Information Management for IoT-based Applications | 
| Self-Encrypting Drive | Performance Study of Software-based Encrypting Data at Rest | 
| service model | Cost Effective Service Oriented Model for Recruitment | 
| short text | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks | 
| smart contracts | DSRBT - Driving Safety Reward based on Blockchain Technology | 
| social media | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks | 
| Software Quality Assurance and Testing | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey | 
| Software-based encryption | Performance Study of Software-based Encrypting Data at Rest | 
| Support Vector Machine | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey | 
| t | 
| text mining | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks | 
| topic modeling | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks | 
| Trigger-Action Programming | An Ontology Based Approach towards End User Development of IoT | 
| Trojan | Mobile Devices Vulnerabilities | 
| v | 
| VR | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | 
| w | 
| White Hat | Ethical Hacking: Skills to Fight Cybersecurity Threats |